-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto-Update: 2023-12-26T21:00:25.506229+00:00
- Loading branch information
1 parent
07b2224
commit 9b4d259
Showing
125 changed files
with
915 additions
and
312 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,12 +2,16 @@ | |
"id": "CVE-2012-10017", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-12-26T10:15:07.483", | ||
"lastModified": "2023-12-26T10:15:07.483", | ||
"vulnStatus": "Received", | ||
"lastModified": "2023-12-26T20:34:16.103", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "A vulnerability was found in BestWebSoft Portfolio Plugin up to 2.04 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 2.06 is able to address this issue. The patch is named 68af950330c3202a706f0ae9bbb52ceaa17dda9d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248955." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "Se encontr\u00f3 una vulnerabilidad en BestWebSoft Portfolio Plugin hasta 2.04 en WordPress. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.06 puede solucionar este problema. El parche se llama 68af950330c3202a706f0ae9bbb52ceaa17dda9d. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-248955." | ||
} | ||
], | ||
"metrics": { | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2014-125109", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-12-26T15:15:08.010", | ||
"lastModified": "2023-12-26T15:15:08.010", | ||
"vulnStatus": "Received", | ||
"lastModified": "2023-12-26T20:34:16.103", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2015-10127", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-12-26T17:15:07.923", | ||
"lastModified": "2023-12-26T17:15:07.923", | ||
"vulnStatus": "Received", | ||
"lastModified": "2023-12-26T20:34:16.103", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2016-10890", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2019-08-21T19:15:12.340", | ||
"lastModified": "2019-08-22T18:30:11.313", | ||
"lastModified": "2023-12-26T19:56:27.157", | ||
"vulnStatus": "Analyzed", | ||
"descriptions": [ | ||
{ | ||
|
@@ -84,9 +84,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:a:activity_log_project:activity_log:*:*:*:*:*:wordpress:*:*", | ||
"criteria": "cpe:2.3:a:pojo:activity_log:*:*:*:*:*:wordpress:*:*", | ||
"versionEndExcluding": "2.3.2", | ||
"matchCriteriaId": "BAF29181-D6BC-4EF5-B88A-D94FCD5E1589" | ||
"matchCriteriaId": "B5F3A5EB-032F-4CEE-8011-BEBD4E5921B7" | ||
} | ||
] | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2016-10891", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2019-08-21T19:15:12.403", | ||
"lastModified": "2019-08-22T18:30:26.830", | ||
"lastModified": "2023-12-26T19:56:27.157", | ||
"vulnStatus": "Analyzed", | ||
"descriptions": [ | ||
{ | ||
|
@@ -84,9 +84,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:a:activity_log_project:activity_log:*:*:*:*:*:wordpress:*:*", | ||
"criteria": "cpe:2.3:a:pojo:activity_log:*:*:*:*:*:wordpress:*:*", | ||
"versionEndExcluding": "2.3.3", | ||
"matchCriteriaId": "984EC9CF-049B-4E26-8EAC-75B6217B5607" | ||
"matchCriteriaId": "A87B55B8-2D37-4A3C-9B59-529EFD0EC923" | ||
} | ||
] | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2018-8729", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2018-03-15T17:29:00.210", | ||
"lastModified": "2019-02-28T13:25:58.307", | ||
"lastModified": "2023-12-26T19:56:27.157", | ||
"vulnStatus": "Analyzed", | ||
"descriptions": [ | ||
{ | ||
|
@@ -84,9 +84,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:a:activity_log_project:activity_log:*:*:*:*:*:wordpress:*:*", | ||
"criteria": "cpe:2.3:a:pojo:activity_log:*:*:*:*:*:wordpress:*:*", | ||
"versionEndExcluding": "2.4.1", | ||
"matchCriteriaId": "DEC9B0E5-48E9-47E4-8A8E-452B771F507C" | ||
"matchCriteriaId": "315028FB-E4B7-4F9F-A37A-85B7C0314EDC" | ||
} | ||
] | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2020-7121", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2020-09-23T13:15:16.030", | ||
"lastModified": "2021-07-21T11:39:23.747", | ||
"lastModified": "2023-12-26T19:56:27.157", | ||
"vulnStatus": "Analyzed", | ||
"descriptions": [ | ||
{ | ||
|
@@ -85,9 +85,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_6200f_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_6200f_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.3021", | ||
"matchCriteriaId": "10FA7A45-DCD7-4FD6-AF8F-3F673E14F504" | ||
"matchCriteriaId": "A77C7E5B-3EAB-4A52-99CF-D2C07B1EA823" | ||
} | ||
] | ||
}, | ||
|
@@ -113,9 +113,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_6300_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_6300_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.3021", | ||
"matchCriteriaId": "BAF1CE95-3E01-47F6-9784-F0F14758862E" | ||
"matchCriteriaId": "81F5C8F4-D85F-42C9-96F7-CD91DAA94FF0" | ||
} | ||
] | ||
}, | ||
|
@@ -141,9 +141,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_6400_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_6400_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.3021", | ||
"matchCriteriaId": "12A59D68-3905-4ECB-9C9D-F8B53B6C58C3" | ||
"matchCriteriaId": "C4BC17A7-2155-4A01-837B-05992EABD0D1" | ||
} | ||
] | ||
}, | ||
|
@@ -169,9 +169,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_8320_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_8320_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.3021", | ||
"matchCriteriaId": "D17E4F12-F8AF-4257-A66F-3D637FD778A4" | ||
"matchCriteriaId": "0123075E-D9A9-46F4-B857-A05ABBED38B5" | ||
} | ||
] | ||
}, | ||
|
@@ -197,9 +197,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_8325_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_8325_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.3021", | ||
"matchCriteriaId": "60913FA8-2459-4531-9BDA-23CBBD35FF4C" | ||
"matchCriteriaId": "D88D164C-70ED-48F4-BF0D-595A27F81B12" | ||
} | ||
] | ||
}, | ||
|
@@ -225,9 +225,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_8400_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_8400_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.3021", | ||
"matchCriteriaId": "F25AA559-8957-4A91-9B66-8AEEFE99B9BD" | ||
"matchCriteriaId": "0504A5A3-A49A-4DEA-9B26-85CD6545932B" | ||
} | ||
] | ||
}, | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2020-7122", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2020-09-23T13:15:16.093", | ||
"lastModified": "2021-07-21T11:39:23.747", | ||
"lastModified": "2023-12-26T19:56:27.157", | ||
"vulnStatus": "Analyzed", | ||
"descriptions": [ | ||
{ | ||
|
@@ -85,9 +85,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_6200f_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_6200f_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.1000", | ||
"matchCriteriaId": "8AAAB31C-A0A1-4D15-841C-05FC8B990DC3" | ||
"matchCriteriaId": "A132767A-E9B9-477E-BAAF-A831694F1FC4" | ||
} | ||
] | ||
}, | ||
|
@@ -113,9 +113,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_6300_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_6300_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.1000", | ||
"matchCriteriaId": "0B235A1B-2E4D-4E53-BFC2-4837E47F2D50" | ||
"matchCriteriaId": "36CB053C-FA12-4065-BC40-FFE6E0B25B00" | ||
} | ||
] | ||
}, | ||
|
@@ -141,9 +141,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_6400_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_6400_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.1000", | ||
"matchCriteriaId": "13DEA0B1-4F1E-4CE4-8E9E-30ABE93FDD78" | ||
"matchCriteriaId": "270EC51F-3CEC-45C1-9E0F-5D38EB550106" | ||
} | ||
] | ||
}, | ||
|
@@ -169,9 +169,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_8320_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_8320_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.1000", | ||
"matchCriteriaId": "5F999F3F-596E-4C70-9CC6-757870D1C42A" | ||
"matchCriteriaId": "CE87AAEE-644E-4699-B639-B4CE94D503A5" | ||
} | ||
] | ||
}, | ||
|
@@ -197,9 +197,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_8325_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_8325_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.1000", | ||
"matchCriteriaId": "07866896-5774-489B-9760-7E0BA19BE2B8" | ||
"matchCriteriaId": "9A5483EC-74BF-4C0D-A751-23C9ED42E29A" | ||
} | ||
] | ||
}, | ||
|
@@ -225,9 +225,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:o:aruba:cx_8400_firmware:*:*:*:*:*:*:*:*", | ||
"criteria": "cpe:2.3:o:arubanetworks:cx_8400_firmware:*:*:*:*:*:*:*:*", | ||
"versionEndIncluding": "10.04.1000", | ||
"matchCriteriaId": "CBB5C3C1-CEE4-4292-BD22-1F7627250057" | ||
"matchCriteriaId": "B2BFEE7A-D4CC-45BF-B277-8C9849A7F616" | ||
} | ||
] | ||
}, | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,12 +2,16 @@ | |
"id": "CVE-2021-38927", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-12-25T03:15:07.943", | ||
"lastModified": "2023-12-25T03:15:07.943", | ||
"vulnStatus": "Received", | ||
"lastModified": "2023-12-26T20:34:16.103", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "IBM Aspera Console 3.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 210322." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "IBM Aspera Console 3.4.0 es vulnerable a cross-site scripting. Esta vulnerabilidad permite a los usuarios incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 210322." | ||
} | ||
], | ||
"metrics": { | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,12 +2,16 @@ | |
"id": "CVE-2022-34267", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-12-25T08:15:07.200", | ||
"lastModified": "2023-12-25T08:15:07.200", | ||
"vulnStatus": "Received", | ||
"lastModified": "2023-12-26T20:34:16.103", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "An issue was discovered in RWS WorldServer before 11.7.3. Adding a token parameter with the value of 02 bypasses all authentication requirements. Arbitrary Java code can be uploaded and executed via a .jar archive to the ws-api/v2/customizations/api endpoint." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "Se descubri\u00f3 un problema en RWS WorldServer antes de la versi\u00f3n 11.7.3. Agregar un par\u00e1metro de token con el valor 02 omite todos los requisitos de autenticaci\u00f3n. Se puede cargar y ejecutar c\u00f3digo Java arbitrario a trav\u00e9s de un archivo .jar en el punto final ws-api/v2/customizations/api." | ||
} | ||
], | ||
"metrics": {}, | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,12 +2,16 @@ | |
"id": "CVE-2022-34268", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-12-25T08:15:07.353", | ||
"lastModified": "2023-12-25T08:15:07.353", | ||
"vulnStatus": "Received", | ||
"lastModified": "2023-12-26T20:34:16.103", | ||
"vulnStatus": "Awaiting Analysis", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "An issue was discovered in RWS WorldServer before 11.7.3. /clientLogin deserializes Java objects without authentication, leading to command execution on the host." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "Se descubri\u00f3 un problema en RWS WorldServer antes de la versi\u00f3n 11.7.3. /clientLogin deserializa los objetos Java sin autenticaci\u00f3n, lo que lleva a ejecuci\u00f3n de comandos en el host." | ||
} | ||
], | ||
"metrics": {}, | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2022-3458", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2022-10-12T07:15:08.947", | ||
"lastModified": "2023-11-07T03:51:16.703", | ||
"lastModified": "2023-12-26T19:56:27.157", | ||
"vulnStatus": "Modified", | ||
"descriptions": [ | ||
{ | ||
|
@@ -37,7 +37,7 @@ | |
"impactScore": 5.9 | ||
}, | ||
{ | ||
"source": "1af790b2-7ee1-4545-860a-a788eba489b5", | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
|
@@ -60,7 +60,7 @@ | |
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "1af790b2-7ee1-4545-860a-a788eba489b5", | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"description": [ | ||
{ | ||
|
@@ -79,8 +79,8 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:a:human_resource_management_system_project:human_resource_management_system:1.0:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "F568F825-03F3-4EA1-8140-AD0DCA462881" | ||
"criteria": "cpe:2.3:a:oretnom23:human_resource_management_system:1.0:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "DB20CFC6-02D1-4450-93F7-8C2BF9847907" | ||
} | ||
] | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2022-3470", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2022-10-13T04:15:10.663", | ||
"lastModified": "2023-11-07T03:51:17.760", | ||
"lastModified": "2023-12-26T19:56:27.157", | ||
"vulnStatus": "Modified", | ||
"descriptions": [ | ||
{ | ||
|
@@ -37,7 +37,7 @@ | |
"impactScore": 3.6 | ||
}, | ||
{ | ||
"source": "1af790b2-7ee1-4545-860a-a788eba489b5", | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
|
@@ -60,7 +60,7 @@ | |
}, | ||
"weaknesses": [ | ||
{ | ||
"source": "1af790b2-7ee1-4545-860a-a788eba489b5", | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"description": [ | ||
{ | ||
|
@@ -79,8 +79,8 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:a:human_resource_management_system_project:human_resource_management_system:-:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "0C5C133F-B37C-426F-AD4A-AB08AE877278" | ||
"criteria": "cpe:2.3:a:oretnom23:human_resource_management_system:-:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "81ABE38B-3546-42D5-AE86-792E08CD3472" | ||
} | ||
] | ||
} | ||
|
Oops, something went wrong.